Back to search results

Digital Identity Analyst - Cyber Security Defense - B5

Denver, Colorado;

Job Description:

The Identity Defense organization aims to protect digital identities which allow access to the Bank's internal network, resources and applications. An Identity Defense analyst has the accountability for researching, designing, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts. 
 
A Digital Identity Analyst will support design efforts to the build out of new processes, controls and supporting governance, related to implementation of human and non-human account monitoring to protect the Bank. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement and influence controls and policy within the digital identity domain. Partner with leaders from line of business organizations to triage security events and report on impacting security incidents.
 
You will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important. Role will also involve discussion with employees as part of alert analysis and disposition.  If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 3 to 5 years of cybersecurity or engineering experience. 

The standard working hours for this position are 9:00 AM - 6:00 PM MST.
 
Required:
• 3 + years of experience with Information Security related activities.
• 2 + years of experience in an operations focused information security role.
• Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
• Ability to analyze data and evaluate relevance to a specific incident under investigation.
• Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
• Ability to exercise independent judgment when responding to alerts.
• Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
• Familiarity with security vulnerabilities exploits and hacker techniques.
• Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
• Familiarity with Splunk, with the ability to build queries
• Knowledgeable of current authentication based exploits. 
• Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
• Supportive and can work well as part of a team as well as independently.
• Can remain calm under pressure.
• Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
• Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
• Security+ or equivalent within 6 months of hire.
 
Responsibilities include, but are not limited to:
• Actively investigate alerts related to potentially anomalous behavior/activity through log analysis and understanding of common network protocols
• Confidently and professionally interview/question users to determine or confirm root cause.
• Communicate effectively with response and business partners.
• Identify areas for further process automation, simplification, and improvement.
• Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
• Risk management.
• Comprehensively document analysis, investigative activities, actions, etc.
• Ability to occasionally work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.

Job Band:

H5

Shift: 

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:

The Identity Defense organization aims to protect digital identities which allow access to the Bank's internal network, resources and applications. An Identity Defense analyst has the accountability for researching, designing, engineering, implementing, and supporting solutions to prevent and detect anomalous use of accounts. 
 
A Digital Identity Analyst will support design efforts to the build out of new processes, controls and supporting governance, related to implementation of human and non-human account monitoring to protect the Bank. You will utilize in-depth technical knowledge and business requirements to help implement scalable solutions, inclusive of monitoring, alerting and escalation frameworks focused on core account protections. Leveraging your knowledge of both common and emerging threats related to account take-over, you will have an opportunity to proactively develop, implement and influence controls and policy within the digital identity domain. Partner with leaders from line of business organizations to triage security events and report on impacting security incidents.
 
You will regularly collaborate with experts in and out of our team, both in country and in other regions, so excellent communication skills are very important. Role will also involve discussion with employees as part of alert analysis and disposition.  If you are seeking a demanding role within Global Information Security (GIS) and have the required skills, this will be a great opportunity for you. Typically, applicants should have 3 to 5 years of cybersecurity or engineering experience. 

The standard working hours for this position are 9:00 AM - 6:00 PM MST.
 
Required:
• 3 + years of experience with Information Security related activities.
• 2 + years of experience in an operations focused information security role.
• Experience conducting analysis/investigation and containment of potential data breaches or cyber security incidents.
• Ability to analyze data and evaluate relevance to a specific incident under investigation.
• Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
• Ability to exercise independent judgment when responding to alerts.
• Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
• Familiarity with security vulnerabilities exploits and hacker techniques.
• Familiarity identity management standards, social engineering TTPs, and the incident response lifecycle.
• Familiarity with Splunk, with the ability to build queries
• Knowledgeable of current authentication based exploits. 
• Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
• Supportive and can work well as part of a team as well as independently.
• Can remain calm under pressure.
• Ability to work in a strong team-orientated environment with a sense of urgency and resilience.
• Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
• Security+ or equivalent within 6 months of hire.
 
Responsibilities include, but are not limited to:
• Actively investigate alerts related to potentially anomalous behavior/activity through log analysis and understanding of common network protocols
• Confidently and professionally interview/question users to determine or confirm root cause.
• Communicate effectively with response and business partners.
• Identify areas for further process automation, simplification, and improvement.
• Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
• Risk management.
• Comprehensively document analysis, investigative activities, actions, etc.
• Ability to occasionally work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.

Shift:

1st shift (United States of America)

Hours Per Week: 

40

Learn more about this role

Full time

JR-21080050

Band: H5

Manages People: No

Travel: Yes, 5% of the time

Manager:

Talent Acquisition Contact:

Adam Waller

Referral Bonus:

0

Colorado job seekers

In accordance with Colorado law:

if you have questions about compensation and general benefits information for this job posting, please email equalpayinformation@bofa.com. This is a dedicated mailbox designed to exclusively support job seekers requesting information under the Colorado law. Only inquiries for this purpose will receive a reply. For all other inquiries, please review our Frequently Asked Questions.